With kerbrute.py:
python kerbrute.py -domain <domain_name> -users <users_file> -passwords <passwords_file> -outputfile <output_file>With Rubeus version with brute module:
| 0 | |
| 00 | |
| 01 | |
| 02 | |
| 03 | |
| 1 | |
| 1.0 | |
| 10 | |
| 100 | |
| 1000 |
| # PowerView's last major overhaul is detailed here: http://www.harmj0y.net/blog/powershell/make-powerview-great-again/ | |
| # tricks for the 'old' PowerView are at https://gist.github.com/HarmJ0y/3328d954607d71362e3c | |
| # the most up-to-date version of PowerView will always be in the dev branch of PowerSploit: | |
| # https://github.com/PowerShellMafia/PowerSploit/blob/dev/Recon/PowerView.ps1 | |
| # New function naming schema: | |
| # Verbs: | |
| # Get : retrieve full raw data sets | |
| # Find : ‘find’ specific data entries in a data set |
With kerbrute.py:
python kerbrute.py -domain <domain_name> -users <users_file> -passwords <passwords_file> -outputfile <output_file>With Rubeus version with brute module:
| # Exploit Title: Jenzabar 9.2.x through 9.2.2 allows /ics?tool=search&query= XSS. | |
| # Google Dork: Jenzabar — v9.2.0 / v9.2.1 / v9.2.2 | |
| # Date: 2021–02–05 | |
| # Exploit Author: y0ung_dst | |
| # Vendor Homepage: https://jenzabar.com | |
| # Version: Jenzabar — v9.2.0-v9.2.1-v9.2.2 (and maybe other versions) | |
| # Tested on: Windows 10 | |
| # CVE : CVE-2021-26723 | |